Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
gallens
New Contributor

Fortigate 90D to connect to strong swan

I cannot seem to get the tunnel up between my FTG90D and my StrongSwan FGT Config FGT90D # config vpn ipsec phase1-interface FGT90D (phase1-interface) # edit Phase1 FGT90D (Phase1) # show full config vpn ipsec phase1-interface edit "Phase1" set type static set interface "Outside-WAN" set ip-version 4 set ike-version 2 set local-gw 0.0.0.0 set nattraversal enable set keylife 86400 set authmethod psk set peertype any set mode-cfg disable set proposal aes128-sha1 set localid "x.x.x.x" set localid-type auto set negotiate-timeout 30 set dpd disable set forticlient-enforcement disable set comments '' set npu-offload enable set dhgrp 5 set eap disable set wizard-type custom set remote-gw x.x.x.x set monitor '' set add-gw-route disable set psksecret ENC <psk> set auto-negotiate enable next end FGT90D (Phase1) # end FGT90D # config vpn ipsec phase2-interface FGT90D (phase2-interface) # edit Phase2 FGT90D (Phase2) # show full-configuration config vpn ipsec phase2-interface edit "Phase2" set phase1name "Phase1" set proposal aes128-sha1 set pfs enable set dhgrp 5 set replay enable set keepalive disable set auto-negotiate disable set keylife-type seconds set encapsulation tunnel-mode set comments '' set protocol 0 set src-addr-type subnet set src-port 0 set dst-addr-type subnet set dst-port 0 set keylifeseconds 86400 set src-subnet 10.101.7.0 255.255.255.0 set dst-subnet x.x.x.x 255.255.255.255 next end     Strongswan IPsec.conf     conn Fortigate90 #CLIENT leftsourceip=x.x.x.x left=%defaultroute leftsubnet=x.x.x.x/32 leftnexthop=%defaultroute leftid=x.x.x.x #REMOTEHOST right=z.z.z.z rightsubnet=10.101.7.0/24 rightnexthop=%defaultroute rightid=z.z.z.z #GENERAL auto=add authby=secret type=tunnel #pfs=yes compress=yes forceencaps=yes keyexchange=ikev2 aggrmode=no #PHASE1 ike=aes128-sha1;modp1536 keylife=86400s ikelifetime=86400s #PHASE2 #phase2=esp #phase2alg=aes128-sha1;modp1536 #REKEYING rekey=yes rekeymargin=15m #You may put your configuration (.conf) file in the "/etc/ipsec.d/" and uncomment this. #include /etc/ipsec.d/*.conf Is ther some mismatch in the config I am missing?
0 REPLIES 0
Labels
Top Kudoed Authors